Insider Threat Training Manual - DoD & Cleared Contractors (AT-2(2))

Have Questions?
Talk to an ASP Expert at 703-591-3466

Description: Comprehensive insider threat training manual that includes training materials on all current and relevant insider threat subject matter as required by AT-2(2) within NIST SP 800-53, Revision 5. Also includes information from DCSA for cleared industry and other related DoD requirements from various publications within the broader Defense Industrial Base (DIB).

Training Modules:

Training Module 1 - Introduction
Training Module 2 - What is an Insider Threat?
Training Module 3 - Who are the Actual “Insiders”?
Training Module 4 - Types of Insider Threats (Unintentional)
Training Module 5 - Types of Insider Threats (Intentional)
Training Module 6 - Costs of Insider Threats
Training Module 7 - How Does an Insider Threat Manifest Itself?
Training Module 8 - How to Detect Insider Threats
Training Module 9 - Threat Indicators
Training Module 10 - Behavioral Indicators
Training Module 11 - Personal Factors
Training Module 12 - Organizational Factors
Training Module 13 - How an Insider Threat Unfolds
Training Module 14 - Assessing the Insider Threat
Training Module 15 - Cleared Industry's Role for Combating Insider Threats
Training Module 16 - Beware! Exploitation of Business Activities
Training Module 17 - Beware! Exploitation of Global Supply Chain
Training Module 18 - Beware! Personal Contact
Training Module 19 - Beware! Foreign Visits
Training Module 20 - Beware! Academic Solicitation
Training Module 21 - Beware! Conferences, Conventions and Trade Shows
Training Module 22 - What to Report - Reporting Requirements for Cleared Contractors
Training Module 23 - What to Report - Mishandling of Classified Information
Training Module 24 - What to Report - Misuse of Computer Systems
Training Module 25 - What to Report - Suspicious Cyber Incidents
Training Module 26 - What to Report - Foreign Influence
Training Module 27 - What to Report - Suspicious Controls
Training Module 28 - What to Report - Suspicious Financial Activity
Training Module 29 - What to Report - Recording Devices
Training Module 30 - More Examples of Insider Threats and Their Consequences
Training Module 31 - Get Assistance
Training Module 32 - You Can Make a Difference
Training Module 33 - Key Points

Specifications: Developed in accordance with NIST SP 800-53, Revision 5 (12-10-2020), and other related security control frameworks, where applicable.

Control Family: Awareness and Training (AT).

Control Mapping: AT-2(2).

Security Control Baseline Coverage: Includes coverage for all LOW, MOD, and HIGH Baselines, per NIST SP 800-53B (12-10-2020).

Direct Compliance Use: FISMA, FedRAMP, NISP eMASS RMF, and other related NIST RMF reporting requirements for security and privacy. Can be used for mapping to DFARS NIST 800-171 and CMMC controls, where applicable.

Format: MS Word document (.docx).

Length: 39 pages.

Get Access to 100 + NIST RMF security and privacy policies & procedures, programs, and plan templates.

What Our Customers Are Saying

Companies Who Trust Us